Advances in Cryptology — ASIACRYPT 2001

7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings

Editors:

ISBN: 978-3-540-42987-6 (Print) 978-3-540-45682-7 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Lattice Based Cryptography

    1. Book Chapter

      Pages 1-20

      Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001

    2. Book Chapter

      Pages 21-35

      On the Insecurity of a Server-Aided RSA Protocol

    3. Book Chapter

      Pages 36-51

      The Modular Inversion Hidden Number Problem

  2. Human Identification

    1. Book Chapter

      Pages 52-66

      Secure Human Identification Protocols

  3. Invited Talk

    1. Book Chapter

      Pages 67-86

      Unbelievable Security Matching AES Security Using Public Key Systems

  4. Practical Public Key Cryptography

    1. Book Chapter

      Pages 87-106

      A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4

    2. Book Chapter

      Pages 107-124

      Computation of Discrete Logarithms in $ \mathbb{F}_{2^{607} } $

    3. Book Chapter

      Pages 125-143

      Speeding Up XTR

    4. Book Chapter

      Pages 144-156

      An Efficient Implementation of Braid Groups

  5. Cryptography Based on Coding Theory

    1. Book Chapter

      Pages 157-174

      How to Achieve a McEliece-Based Digital Signature Scheme

    2. Book Chapter

      Pages 175-192

      Efficient Traitor Tracing Algorithms Using List Decoding

  6. Block Ciphers

    1. Book Chapter

      Pages 193-207

      Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis

    2. Book Chapter

      Pages 208-221

      Known-IV Attacks on Triple Modes of Operation of Block Ciphers

    3. Book Chapter

      Pages 222-238

      Generic Attacks on Feistel Schemes

    4. Book Chapter

      Pages 239-254

      A Compact Rijndael Hardware Architecture with S-Box Optimization

  7. Provable Security

    1. Book Chapter

      Pages 255-271

      Provable Security of KASUMI and 3GPP Encryption Mode f8

    2. Book Chapter

      Pages 272-289

      Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices

    3. Book Chapter

      Pages 290-309

      Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case

  8. Threshold Cryptography

    1. Book Chapter

      Pages 310-330

      Fully Distributed Threshold RSA under Standard Assumptions

    2. Book Chapter

      Pages 331-350

      Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes

previous Page of 2